NEWS > Cybersecurity News


« Back to News

2017-10-09

British Police’s First Cyber Dogs

Police are using the detection dogs to track down computer software hidden in homes of suspected sex offenders.

2017-10-02

Facebook To Give Congress Thousands Of Election Ads Bought By Russians

Full Disclosure: Facebook will provide US Govt. thousands of ads purchased by Russians during the 2016 US presidential race.

2017-10-09

Iranian Hackers Linked To Malware

Iran has earned a reputation for aggressive state-sponsored hacking, stealing data from corporate and government networks around the world.

2017-10-09

China Wants To Use AI To Predict Civil Disorder

China’s domestic intelligence chief tells police to use Artificial Intelligence to improve their ability to predict social unrest.

2017-10-05

N.Korea's Cyber Threats To S.Korea

Alongside the escalating missile threat N Korea is stepping up cyber intrusions with fake communications and hacking attacks.

2017-09-21

Bashing Facebook Is Not The Answer To Curbing Russian Influence Operations

Scapegoating Facebook is an easy way to explain Russian influence on the US election, but distracts from more fundamental questions.

2017-09-20

Wikileaks Release Details Of Mass Surveillance In Russia

For the first time Wikileaks has released (what it claims is) material directly pertaining to the Russian state and its mass surveillance apparatus.

2017-09-25

Is A Cyberattack An Act of War?

As warfare becomes increasingly digital, countries are facing a major problem: It’s hard to define when a cyber attack constitutes an act of war.

2017-09-21

Get Your Data Strategy On Board

Only 32% of UK organisations plan to significantly invest in data and analytics in 2017, according to new research by DataIQ Leaders.

2017-10-05

The Hidden History of CyberCrime Forums

In 2001 a crime forum created to monetise stolen credit card numbers formed the framework for today's criminal underground.

2017-09-25

Banks Join Forces to Fight CyberCrime

Local and international banks in the United Arab Emirates are sharing information in an effort to reduce cyber attacks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.